1 / 10

The Diffie -Hellman protocol

Online Cryptography Course Dan Boneh. Basic key exchange. The Diffie -Hellman protocol. Key exchange without an online TTP?. Goal : Alice and Bob want shared secret, unknown to eavesdropper

adanna
Télécharger la présentation

The Diffie -Hellman protocol

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Online Cryptography Course Dan Boneh Basic key exchange The Diffie-Hellman protocol

  2. Key exchange without an online TTP? • Goal: Alice and Bob want shared secret, unknown to eavesdropper • For now: security against eavesdropping only (no tampering) Alice Bob eavesdropper ?? Can this be done with an exponential gap?

  3. The Diffie-Hellman protocol (informally) Fix a large prime p (e.g. 600 digits) Fix an integer g in {1, …, p} Alice Bob choose random a in {1,…,p-1} choose random b in {1,…,p-1} = (ga)b=Ab(mod p) Ba(mod p) = (gb)a= kAB = gab(mod p)

  4. Security (much more on this later) Eavesdropper sees: p, g, A=ga (mod p), and B=gb (mod p) Can she compute gab(mod p) ?? More generally: define DHg(ga, gb) = gab (mod p) How hard is the DH function mod p?

  5. How hard is the DH function mod p? Suppose prime p is n bits long. Best known algorithm (GNFS): run time exp( ) cipher key sizemodulus size 80 bits 1024 bits 128 bits 3072 bits 256 bits (AES) 15360 bits As a result: slow transition away from (mod p) to elliptic curves Elliptic Curvesize 160 bits 256 bits 512 bits

  6. Elliptic curveDiffie-Hellman

  7. Insecure against man-in-the-middle As described, the protocol is insecure against active attacks Alice Bob MiTM

  8. Another look at DH Facebook ga gb gc gd ⋯ Alice Bob Charlie David d c b a KAC=gac KAC=gac

  9. An open problem Facebook ga gb gc gd ⋯ Alice Bob Charlie David d c b a KABCD KABCD KABCD KABCD

  10. End of Segment

More Related